Tweetovi

Blokirali ste korisnika/cu @Rogunix

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Rogunix

  1. proslijedio/la je Tweet
    28. sij

    [Educational] One of the best blog posts that I ever read about going from 0 to unauth RCE in f**king Mikrotik OS step by step:

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    28. sij

    Check out ' tips on Fuzzing, to overcome known challenges and maximize results:

    Poništi
  3. proslijedio/la je Tweet
    27. sij

    Just pushed a somewhat big update to SILENTTRINITY with a lot of forward compatibility fixes for Python 3.8 and made the PowerShell "stageless" stager public. Plus more modules and bug fixes

    Poništi
  4. proslijedio/la je Tweet
    22. sij

    Here is the link to the SpecterOps Adversary Tactics: PowerShell course material: Enjoy! For information about our current training offerings, information can be found here: (4/4)

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    22. sij

    Revisiting RDP lateral movement and releasing a project that will be part of a bigger tool coming next week

    Poništi
  6. proslijedio/la je Tweet
    9. sij

    Responder 3.0.0.0 is out! Massive upgrade, support for both py3 and py2, many bug fix, enhancements and Q.A++ on all servers, poisoners and tools. Enjoy! ;)

    Poništi
  7. proslijedio/la je Tweet
    9. sij

    I'm very excited to share my blogpost series (including PoC code) about a remote, interactionless iPhone exploit over iMessage:

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    27. pro 2019.

    SharpSploit v1.5 is out! Includes amazing work from , , , , and . Includes: lateral movement over SCM and PSRemoting, an AMSI bypass, CreateProcessWithToken, and DynamicInvoke improvements. 🔥🔥🔥

    Poništi
  9. proslijedio/la je Tweet
    24. pro 2019.

    New XMas release of frida-fuzzer: 1.2 🎉 A release with Android fuzzing in mind. Moar speed for remote (e.g. with adb) and ARM fuzzing and support to dictionaries.

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    21. pro 2019.

    Last project of 2019. I created an image-based C2 channel proof of concept that posts/retrieves stego'd images on Imgur. As a PoC only, I've simulated a proper implant in Python. The Framework is called Dali, after the artist. For fun & to learn!

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    20. pro 2019.

    Cutter v1.10 now has a DEBUGGER! 🐞🥳 After a lot of work, we are so happy to announce that we finally implemented your most requested feature. The beta version of the debugger is available NOW on our website >> List of features and what's coming next >>

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    16. pro 2019.

    A nice write-up on WinAFL setup for fuzzing popular image viewers resulting in quite a few bugs.

    Poništi
  13. proslijedio/la je Tweet
    14. pro 2019.

    I repropose my notes about x86, Linux and virtualization in a single text file (~2500 lines only) for my fellow students in Sapienza.

    Poništi
  14. proslijedio/la je Tweet
    12. pro 2019.

    First blog post in a short series about some vulnerabilities that I found in Ubuntu's crash reporter earlier this year. I learned a lot from working on the exploits, so I am going to share some of the tips and tricks that I learned.

    Poništi
  15. proslijedio/la je Tweet
    10. pro 2019.

    Introducing SysWhispers, a tool that helps with AV/EDR evasion by using direct system calls to bypass user-mode API hooks. It works by generating header/ASM pairs supporting all core syscalls from Windows XP to 10. Check it out here with examples:

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    12. pro 2019.

    Good news! Stalker is now ready for fuzzing and my frida-fuzzer is ready to fuzz APIs of Android apps. With a logic inspired by AFL, it has a libFuzzer-like harness interface. The project is in his early stage, look at the TODOs to contribute.

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    6. pro 2019.

    Here is an exploit chain I wrote for Firefox that gets RCE via CVE-2019-9810 and escape the sandbox with CVE-2019-11708/CVE-2019-9810. Once compromised, it drops a payload and injects privileged JS code in already/newly created tabs.

    Poništi
  18. proslijedio/la je Tweet
    6. pro 2019.

    The Gomium Browser - Exploits different approaches including an unexpected Go compiler bug, well done & others!

    Poništi
  19. proslijedio/la je Tweet
    29. stu 2019.

    What , & spent their SenseCon doing - hacking Doom. From dynamic hooking to static patching all with Frida.

    Poništi
  20. proslijedio/la je Tweet

    The slides for POC 2019 presented by can be found here - Exploiting CVE-2018-8611 - Windows Kernel Transaction Manager (KTM) Race Condition -

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·